What is the Cyber equivalent of physical displays of military strength?

Picture1
Many times in our history, the United States has deployed a carrier battle group as a sign of strength and projection of power. An aircraft carrier is recognizable by most of the world and can be very intimidating if you are potentially on the receiving end of its payload of missiles and aircraft. Similarly, the United States has also conducted joint military exercises with allies and deployed squadrons of combat aircraft at times of stress. These actions can escalate tensions, but can also show strength and resolve during times of diplomatic negotiations. We project our power in the air, on land and in the sea – are there methods we could be using in cyberspace?
Read More…

The Cyber Poverty Line

CPL

I recently had the chance to participate in my third “Cyber Moonshot” session. During a brainstorming session on how to increase the cost of performing cyber attacks by 100x, Andrew Wild mentioned the concept of the “Cyber Poverty Line”. This concept made it into our final group brief to the larger session and several Moonshot participants mentioned to me they liked the concept which led to this blog.
Read More…

Deep Thoughts on Enterprise Cyber Risk

1*R5JZhwYoI1imwip9bpTlfA

Fake Risk Graphs generated from http://sporkforge.com


I started writing this blog right after the release of Senator Warren’s report on Equifax and completely failed. I tried to pack every relevant anecdote I had experienced while meeting cyber risk companies, being CEO of Tenable, running an intrusion detection company and being a penetration tester.

Read More…

ABS, SDS & TIG — Three New Cyber Emerging Market Categories You Should Know



0*WZQR4nN5JP1T6AEF
The cyber industry continues to innovate and offer new ways to help organizations stay secure and compliant. Over the past few months I’ve observed analyst, media and pundit coverage of three new cyber product categories — software defined segmentationthreat intelligence gateways and automated breach simulation. All three offer many new ways to increase the effectiveness and efficiency of your security programs. I will discuss each briefly and reference relevant Gula Tech Adventures portfolio companies in these new categories.
Read More…

DHS and Cyber Security Readiness

0*cKiFTPEblljA4bQ3

(Cover artwork from Senator Coburn’s report on DHS)

report from Senator Tom Coburn about the Department of Homeland Security details a variety of concerns about the organization’s ability to counter cyber attacks. ZDNet wrote an unflattering article about the cyber shortcomings with the headline “ New Report : DHS is a mess of cybersecurity incompetence”. The main points of the article are:

Read More…

CERT’s Blacklist Ecosystem Analysis: 2016 Update

0*bZjN9yQ4oqW-t-Nm
If you are not aware of CERT’s work in tracking the “IOC”, “threat sharing” and “threat feed” space, I highly suggest you take a look at their most recent update to the Blacklist Ecosystem Analysis paper.
Read More…